Results 151 to 160 of about 70,954 (220)
Transverse thermoelectric (TE) technology gains increasing attention as it enables efficient power generation within a single TE element and eliminates junctions. This study enhances transverse thermopower in polycrystalline Sr3YCo4O10‐δ through oxygen vacancy defect engineering, utilizing the anomalous Nernst effect to improve TE efficiency.
Min Young Kim+7 more
wiley +1 more source
Securing digital images: A chaos-driven scrambling algorithm using the Rössler system. [PDF]
Zulfiqar N+7 more
europepmc +1 more source
This study demonstrates that prolonged rhythmic 40 Hz light flicker enhances spatial learning by stimulating PV interneuron‐dependent neurogenesis. The light flicker selectively activates PV interneurons, which enhances GABAergic support for the integration of immature neurons in the adult dentate gyrus.
Hai Yan+16 more
wiley +1 more source
An Effective Parameter Analysis for Sending-or-Not-Sending Quantum Key Distribution with Untrusted Light Sources. [PDF]
Huang J, Li W, Qiao Y.
europepmc +1 more source
Development and Breeding of Herbicide‐Resistant Sorghum for Effective Cereal‐Legume Intercropping
This study identified two SbALS mutations (A93T and S624N) conferring robust herbicide resistance in sorghum, facilitating efficient weed control. Structural analysis revealed that imazamox resistance is mediated by disrupted herbicide binding. Furthermore, 126 imazamox resistant soybean varieties are screened for sorghum‐soybean intercropping ...
Sanyuan Tang+20 more
wiley +1 more source
Utilizing Encryption Keys Derived from Immunoaffinity Interactions as a Basis for Potential Security Enhancements. [PDF]
Cowley A+5 more
europepmc +1 more source
Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang+8 more
wiley +1 more source
A verifiably secure and robust authentication protocol for synergistically-assisted IoD deployment drones. [PDF]
Algarni AD, Innab N, Algarni F.
europepmc +1 more source
Protected Chaos in a Topological Lattice
Topological and chaotic dynamics are often considered incompatible, with one expected to dominate or disrupt the other. This work reveals that topological localization can persist even under strong chaotic dynamics and, counter‐intuitively, protect chaotic behavior.
Haydar Sahin+6 more
wiley +1 more source
Intelligent two-phase dual authentication framework for Internet of Medical Things. [PDF]
Asif M+6 more
europepmc +1 more source